by david | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...
by Dan Siebert | Apr 28, 2019 | IT Blueprint, Security, Technology
Remote Support Name Email Address Enter best contact number Enter problem description. 8 + 15 = Start session After submitting your request we will contact you. Please wait for us to call or send you a code, then enter it below. Enter your six-digit code, then click...
by david | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by david | Apr 25, 2017 | Security, Technology, Training, Web presence
Technology and a golden ticket at Black Mountain Chocolate Factory For Easter, I used technology and a golden ticket to have a great time with my youngest daughter. The golden ticket came from the Black Mountain Chocolate Factory in downtown Winston Salem. It’s only...
by david | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence
Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...
by david | Apr 16, 2017 | Clouds, Privacy, Security, Training
Managing critical systems Managing critical sytsems is a huge concern for big business and governments. Despite the media frenzy over the NSA data release about potential Microsoft exploits, this data is widely known among hackers and IT professionals. Many owners and...